top of page
Enterprise Security Tech
A cybersecurity resource for CxOs
Search
Apr 4, 2024
Red CryptoApp: A New Ransomware Group Emerges with a Focus on Data Leaks
According to Netenrich, a new ransomware group named Red CryptoApp has recently surfaced, making waves in the cybersecurity world with...
Apr 4, 2024
Report Reveals Data Quality Challenges in AI Implementation
As the world continues to embrace artificial intelligence (AI) at scale, AvePoint, in collaboration with the Association for Intelligent...
Apr 4, 2024
New Email Authentication Requirements: A Unified Effort to Combat Email Threats
In a recent roundtable hosted by Valimail, in collaboration with email giants Google and Yahoo, industry leaders came together to discuss...
Apr 3, 2024
Infostealer Malware: How to Prepare for this New Wave of Enterprise Risk
This guest blog was written by Ryan Bell, Threat Intel Manager, Corvus Insurance Enterprise security teams from the CISO to security...
Apr 2, 2024
Bitwarden Makes Authentication Simple with Magic Links API for Passwordless Access
Bitwarden has announced the release of a magic links API for Bitwarden Passwordless.dev, a significant step forward in promoting...
Apr 2, 2024
Sophisticated Backdoor Discovered in XZ Utils, Highlighting Supply Chain Vulnerability
A new analysis has revealed that the malicious code inserted into the open-source library XZ Utils, widely used in major Linux...
bottom of page